top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied cyber security and the smart grid [[electronic resource] ] : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Applied cyber security and the smart grid [[electronic resource] ] : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Autore Knapp Eric D
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Descrizione fisica 1 online resource (225 p.)
Disciplina 621.310285/58
Altri autori (Persone) SamaniRaj
LangillJoel
Soggetto topico Smart power grids - Security measures
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-299-40881-8
0-12-404638-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Record Nr. UNINA-9910463232803321
Knapp Eric D  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Autore Knapp Eric D
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Descrizione fisica 1 online resource (xxii, 202 pages) : illustrations (some color)
Disciplina 621.310285/58
Collana Gale eBooks
Soggetto topico Smart power grids - Security measures
Computer networks - Security measures
ISBN 1-299-40881-8
0-12-404638-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Record Nr. UNINA-9910786127803321
Knapp Eric D  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure / / Eric D. Knapp, Raj Samani ; Joel Langill, technical editor
Autore Knapp Eric D
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Descrizione fisica 1 online resource (xxii, 202 pages) : illustrations (some color)
Disciplina 621.310285/58
Collana Gale eBooks
Soggetto topico Smart power grids - Security measures
Computer networks - Security measures
ISBN 1-299-40881-8
0-12-404638-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Introduction Chapter 1: What is the Smart Grid? Chapter 2: Smart Grid Network Architecture Chapter 3: Hacking the Smart Grid Chapter 4: Privacy Concerns with the Smart Grid Chapter 5: Security Models for SCADA, ICS and Smart Grid Chapter 6: Securing the Smart Grid Chapter 7: Securing the Supply Chain Chapter 8: The Future of the Grid Appendix A: Reference Models and Architectures Appendix B: Continued Reading Glossary.
Record Nr. UNINA-9910820595503321
Knapp Eric D  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny
Federal cloud computing : the definitive guide for cloud service providers / / Matthew Metheny
Autore Metheny Matthew
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2012
Descrizione fisica 1 online resource (461 p.)
Disciplina 004.67/82
Soggetto topico Cloud computing - Security measures
Web services - Government policy
ISBN 9781283852302
1283852306
9781597497398
1597497398
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Chapter 1 - Introduction to the Federal Cloud Computing Strategy Chapter 2 - Cloud Computing Standards Chapter 3 - A Case for Open Source Chapter 4 - Security and Privacy in Public Cloud Computing Chapter 5 - Applying the NIST Risk Management Framework Chapter 6 - Risk Management Chapter 7 - Comparison of FISMA with Other Security Compliance Standards Chapter 8 - FedRAMP Primer Chapter 9 - The FedRAMP Cloud Computing Security Requirements Chapter 10 - Assessment and Authorization (A&A): Governance, Preparation, and Execution Chapter 11 - Strategies for Continuous Monitoring Chapter 12 - Cost-Effective Compliance using Security Automation Appendix - Federal-focused Case Study for Cloud Service Providers using the CSA GRC Stack.
Record Nr. UNINA-9911004765503321
Metheny Matthew  
Amsterdam ; ; Boston, : Elsevier/Syngress, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing information security / / edited by John R. Vacca
Managing information security / / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2014
Descrizione fisica 1 online resource (xxiv, 347 pages) : illustrations (some color)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer security - Management
Electronic data processing departments - Security measures
Computer networks - Security measures
ISBN 0-12-416694-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks
Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False
Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem
3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy
Processes for IT Security Governance Planning
Record Nr. UNINA-9910790566603321
Amsterdam ; ; Boston, : Elsevier/Syngress, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing information security / / edited by John R. Vacca
Managing information security / / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, 2014
Descrizione fisica 1 online resource (xxiv, 347 pages) : illustrations (some color)
Disciplina 005.8
Collana Gale eBooks
Soggetto topico Computer security - Management
Electronic data processing departments - Security measures
Computer networks - Security measures
ISBN 0-12-416694-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks
Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False
Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem
3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy
Processes for IT Security Governance Planning
Record Nr. UNINA-9910815323303321
Amsterdam ; ; Boston, : Elsevier/Syngress, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing information security [[electronic resource] /] / edited by John R. Vacca
Managing information security [[electronic resource] /] / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, c2010
Descrizione fisica 1 online resource (372 p.)
Disciplina 005.8
Altri autori (Persone) VaccaJohn R
Soggetto topico Computer security - Management
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-416694-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks
Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False
Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem
3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy
Processes for IT Security Governance Planning
Record Nr. UNISA-996426337003316
Amsterdam ; ; Boston, : Elsevier/Syngress, c2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Managing information security [[electronic resource] /] / edited by John R. Vacca
Managing information security [[electronic resource] /] / edited by John R. Vacca
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Syngress, c2010
Descrizione fisica 1 online resource (372 p.)
Disciplina 005.8
Altri autori (Persone) VaccaJohn R
Soggetto topico Computer security - Management
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-416694-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Managing Information Security; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Information Security Essentials for IT Managers; 1. Information Security Essentials for it Managers, Overview; Scope of Information Security Management; CISSP Ten Domains of Information Security; What is a Threat?; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth
Contingency PlanningAn Incident Response (IR) Plan; Business Continuity Planning (BCP); 3. Information Security from the Ground Up; Physical Security; Facility Requirements; Administrative, Technical, and Physical Controls; Data Security; Data Classification; Access Control Models; Systems and Network Security; Host-Based Security; Network-Based Security; Intrusion Detection; Intrusion Prevention; Business Communications Security; General Rules for Self-Protection; Handling Protection Resources; Rules for Mobile IT Systems; Operation on Open Networks
Additional Business Communications GuidelinesWireless Security; Access Control; Confidentiality; Integrity; Availability; Enhancing Security Controls; Web and Application Security; Web Security; Application Security; Security Policies and Procedures; Security Employee Training and Awareness; The Ten Commandments of SETA; 4. Security Monitoring and Effectiveness; Security Monitoring Mechanisms; Incidence Response and Forensic Investigations; Validating Security Effectiveness; Vulnerability Assessments and Penetration Tests; 5. Summary; Chapter Review Questions/Exercises; True/False
Multiple ChoiceExercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; 2. Security Management Systems; 1. Security Management System Standards; 2. Training Requirements; 3. Principles of Information Security; 4. Roles and Responsibilities of Personnel; 5. Security Policies; 6. Security Controls; 7. Network Access; 8. Risk Assessment; 9. Incident Response; 10. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem
3. Information Technology Security Management1. Information Security Management Standards; Federal Information Security Management Act; International Standards Organization; 2. Other Organizations Involved in Standards; 3. Information Technology Security Aspects; Security Policies and Procedures; Security Organization Structure; End User; Executive Management; Security Officer; Data/Information Owners; Information System Auditor; Information Technology Personnel; Systems Administrator; IT Security Processes; Processes for a Business Continuity Strategy
Processes for IT Security Governance Planning
Record Nr. UNINA-9910452646003321
Amsterdam ; ; Boston, : Elsevier/Syngress, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Managing information security / edited by John R. Vacca
Managing information security / edited by John R. Vacca
Edizione [2. ed.]
Pubbl/distr/stampa Amsterdam ; Boston, : Elsevier/Syngress, 2010
Descrizione fisica Testo elettronico (PDF) (347 p.)
Disciplina 005.8
Altri autori (Persone) VACCA, John R
Soggetto topico Sicurezza informatica
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996461152803316
Amsterdam ; Boston, : Elsevier/Syngress, 2010
Risorse elettroniche
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui